Guidance on migration to SHA-2


Click here to register

Date: 18th November 2014 
Time: 2:00 p.m. - 3:00 p.m. GMT

Google has advised that Chrome will gradually sunset SHA-1 cryptography, which is used in the signing process of SSL certificates. Join Entrust for a complimentary webinar that discusses the impact of these changes and why you need to migrate to SHA-2 SSL certificates.

  • Learn How to Begin Your SHA-2 Migration Strategy 
  • Understand Risks, Requirements & Key Dates 
  • Gain an Understanding of SHA-1 & SHA-2 Cryptography 
  • Explore How Changes will Affect Chrome Users 
  • Get an Inside Look at Tools that Could Streamline the Process
Speaker:

Dathan Demone, Technical Sales Consultant, Entrust

Sponsor:



Click here to register

Date: 13th November 2014 
Time: 2:00 p.m. - 3:00 p.m. GMT

We have reached the age of the “always-on workforce”. Mobile devices, including smartphones, laptops and tablets, connect people to their work 24 hours a day. More and more employees are accessing and processing sensitive corporate information whilst out of the office. This is a world without boundaries, where we are always connected and therefore, always need to be secure.

With our increased connectedness comes increased risk. Mobile threats are escalating in frequency and sophistication every year. With this risk, how can you be confident that you are secure in today's mobile environment?

Check Point's Secure Mobile Solution provides a multi-layer approach to protect business data from threats, establish a secure business environment on mobile devices, and secure business documents, devices and networks with one integrated solution. With the Check Point Secure Mobile Solution, you are Always SecureOn Any DeviceEverywhere you go.

Speakers:

Peter Hughes, Principal Pre-Sales Consultant, NTT Com Security 

Sunny Gill – Check Point Security Engineer, Check Point Software Technologies

Sponsors:
Click here to register

Date: 13th November 2014 
Time: 2:00 p.m. - 3:00 p.m. GMT

We have reached the age of the “always-on workforce”. Mobile devices, including smartphones, laptops and tablets, connect people to their work 24 hours a day. More and more employees are accessing and processing sensitive corporate information whilst out of the office. This is a world without boundaries, where we are always connected and therefore, always need to be secure.

With our increased connectedness comes increased risk. Mobile threats are escalating in frequency and sophistication every year. With this risk, how can you be confident that you are secure in today's mobile environment?

Check Point's Secure Mobile Solution provides a multi-layer approach to protect business data from threats, establish a secure business environment on mobile devices, and secure business documents, devices and networks with one integrated solution. With the Check Point Secure Mobile Solution, you are Always SecureOn Any DeviceEverywhere you go.

Speakers:

Peter Hughes, Principal Pre-Sales Consultant, NTT Com Security 

Sunny Gill – Check Point Security Engineer, Check Point Software Technologies

Sponsors:

Sign up to our newsletters